dn9uy3n / Modern-Red-Team-InfrastructureView external linksLinks
A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.
☆186Updated this week
Alternatives and similar repositories for Modern-Red-Team-Infrastructure
Users that are interested in Modern-Red-Team-Infrastructure are comparing it to the libraries listed below
Sorting:
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆73Nov 6, 2025Updated 3 months ago
- A stager and implant that executes remote Web Assembly☆33Feb 4, 2026Updated last week
- ☆92Feb 6, 2026Updated last week
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 8 months ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆82Updated this week
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆60Jan 5, 2026Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆19Apr 4, 2023Updated 2 years ago
- A portable C# utility for enumerating local and remote windows sessions☆55Jan 1, 2026Updated last month
- modified mssqlclient from impacket to extract policies from the SCCM database☆42Nov 4, 2025Updated 3 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆140Dec 6, 2025Updated 2 months ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆23Dec 15, 2025Updated last month
- ☆139Sep 9, 2025Updated 5 months ago
- Stealthily inject shellcode into an executable☆445Oct 19, 2025Updated 3 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 6 months ago
- ☆164Oct 21, 2025Updated 3 months ago
- KeySec Hunter is a **Chrome extension** that scans webpages and linked JavaScript files for **user-defined keywords** and **potential sec…☆57Dec 21, 2025Updated last month
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Sep 1, 2023Updated 2 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- Resolve Skype accounts by phone number with API interface☆13Jul 16, 2023Updated 2 years ago
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 3 weeks ago
- ☆59Dec 10, 2025Updated 2 months ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆94Jul 3, 2025Updated 7 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 6 months ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆113Dec 21, 2025Updated last month
- CyberShield 2025 Intro to EDR Evasion Class☆17Jun 3, 2025Updated 8 months ago
- A different approach to writing BOFs in rust.☆18Aug 20, 2025Updated 5 months ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆91May 24, 2025Updated 8 months ago
- Find jmp gadgets for call stack spoofing.☆75Oct 1, 2025Updated 4 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30May 7, 2024Updated last year
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated 11 months ago
- ☆47Dec 5, 2025Updated 2 months ago
- Extract SAM and SYSTEM using Volume Shadow Copy (VSS) API. With multiple exfiltration options and XOR obfuscation☆336Feb 2, 2026Updated last week
- MacOS Shared Library to Shellcode Loader☆39Feb 5, 2026Updated last week
- ☆70Dec 26, 2025Updated last month
- Blog/Journal on how to backdoor VSCode extensions☆76Updated this week
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- ☆13Dec 21, 2023Updated 2 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆20May 22, 2025Updated 8 months ago